You are on page 1of 3


TITLE- Cryptography

What is Cryptography: cryptography is the practice and

hiding information. It is to be noted that encryption is no
longer an exemptible option when conducting ecommerce.
Given the importance it bears on ecommerce, it id one area
that will have its share of security concerns as well.
Encryption on its own cannot guarantee foolproof security so
cryptography is to be needed.

Public-key cryptography:

• Public-key cryptography was invented in 1976 by

Whitfield Diffie and Martin Hellman.

• In this system, each person gets a pair of keys, called

the public key and the private key.

• Each person’s public key is published while the private

key is kept secret.

• Anyone can send a confidential message just using

public information, but it can only be decrypted with a
private key that is in the sole possession of the
intended recipient.

Cryptography can be classified as the study of

techniques and applications that depend on the existence of
difficult problems. A cryptanalyst attempts to compromise
cryptographic mechanisms and cryptology (from the Greek
kryptos logos, meaning “hidden word”) is the discipline of
cryptography and cryptanalysis combined.

The concept of public key cryptography is to solve the key

management problem. In their concept, each person gets a
pair of keys one called public key and other is called private
key. This eliminates the need for the sender and receiver to
share secret information, as all communication involve only
public keys, and no private key is ever transmitted or
shared. This option also secured the communication against
eavesdropping or betrayal.

The only requirement is that public keys must be associated

with their users in a trusted manner. With PKI, anyone can
send a confidential message by using public key, which is in
the possession of the intended recipient. Furthermore,
public-key cryptography meets the need for privacy and

Important points:

• Using public key infrastructure (PKI), anyone can send a

confidential message using public information, which
can be decrypted with a private key in the sole
possession of the intended recipient.

• RSA encryption is widely used and is a ‘de-facto’

encryption standard.

• The MD5 algorithm is intended for digital signature

applications, where large file must be compressed
securely before being encrypted.

Submitted To:
Submitted by:

Amit Mishra Manish Tanwar

Astt. Professor IV Year, A2